

InterviewSolution
Saved Bookmarks
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your ISRO knowledge and support exam preparation. Choose a topic below to get started.
1. |
We can make a class abstract by(A) Declaring it abstract using the virtual keyword(B) Making at least one member function as virtual function(C) Making at least one member function as pure virtual function(D) Making all member function const |
Answer» | |
2. |
Which of the following need not necessarily be saved on a Context Switch between processes?(A) General purpose registers(B) Translation look-aside buffer(C) Program counter(D) Stack pointer |
Answer» | |
3. |
Which of the following need not necessarily be saved on a context switch between processes?(A) General purpose registers(B) Translation look-aside buffer(C) Program counter(D) All of the above |
Answer» | |
4. |
Raid configurations of the disks are used to provide(A) Fault-tolerance(B) High speed(C) High data density(D) A & B |
Answer» | |
5. |
How many 2-input multiplexers are required to construct a 210-input multiplexer?(A) 1023(B) 31(C) 10(D) 127 |
Answer» | |
6. |
If (12x)3 = (123)x, then the value of x is(A) 3(B) 3 or 4(C) 2(D) None of these |
Answer» None | |
7. |
If N2 = (7601)8 where N is a positive integer, then the value of N is(A) (241)5(B) (143)6(C) (165)7(D) (39)16 |
Answer» | |
8. |
In the given network of AND and OR gates, f can be written as(A) X0X1X2 … Xn + X1X2 … Xn + X2X3 … Xn + ⋯ + Xn(B) X0X1 + X2X3 + … Xn-1 Xn(C) X0 + X1 + X2 + … + Xn(D) X0X1 + X3 … Xn−1 + X2X3 + X5 … Xn−1 + ⋯ + Xn−2Xn−1 + Xn |
Answer» | |
9. |
The Boolean theorem AB + A’C + BC = AB + A’C corresponds to(A) (A + B) ∙ (A’ + C) ∙ (B + C) = (A + B) ∙ (A’ + C)(B) AB + A’C + BC = AB + BC(C) AB + A’C + BC = (A + B) ∙ ( A ‘+ C) ∙ (B + C)(D) (A + B) ∙ (A’ + C) ∙ (B + C) = AB + A’C |
Answer» | |
10. |
What is the bandwidth of the signal that ranges from 40 kHz to 4 MHz(A) 36 MHz(B) 360 kHz(C) 3.96 MHz(D) 396 kHz |
Answer» | |
11. |
A computer uses 8 digit mantissa and 2 digit exponent. If a = 0.052 and b = 28E + 11 then b + a – b will(A) result in an overflow error(B) result in an underflow error(C) be 0(D) be 5.28 E + 11 |
Answer» None | |
12. |
The Boolean expression ( A + C’)(B’+ C’) simplifies to(A) C’ + AB’(B) C’ (A’ + B)(C) B’C’ + AB’(D) None of these. |
Answer» None | |
13. |
In the expression A'(A’ + B’) by writing the first term A as A + 0, the expression is best simplified as(A) A + AB(B) AB(C) A’(D) A + B |
Answer» None | |
14. |
Which one of the following algorithm design techniques is used in finding all pairs of shortest distances in a graph?(A) Dynamic programming(B) Backtracking(C) Greedy(D) Divide and Conquer |
Answer» | |
15. |
Which of the following architecture is/are not suitable for realising SIMD?(A) Vector processor(B) Array processor(C) Von Neumann(D) All of the above |
Answer» | |
16. |
Four jobs to be executed on a single processor system arrive at time 0 in the order A, B, C, D . Their burst CPU time requirements are 4, 1, 8, 1 time units respectively. The completion time of A under round robin scheduling with time slice of one time unit is(A) 10(B) 4(C) 8(D) 9 |
Answer» | |
17. |
The logic operations of two combinational circuits in Figure-I and Figure-II are(A) entirely different(B) identical(C) complementary(D) dual |
Answer» None | |
18. |
Consider the following code segmentfor (int k=0; k<20; k=k+2){if (k % 3 == 1)system.out.print(k+ " ")}What is printed as a result of executing the code segment?(A) 4 16(B) 4 10 16(C) 0 6 12 18(D) 1 4 7 10 13 16 19 |
Answer» None | |
19. |
More than one word are put in one cache block to(A) exploit the temporal locality of reference in a program(B) exploit the spatial locality of reference in a program(C) reduce the miss penalty(D) none of these |
Answer» | |
20. |
The Memory Address Register(A) is a hardware memory device which denotes the location of the current instruction being executed.(B) is a group of electrical circuit, that performs the intent of instructions fetched from memory(C) contains the address of the memory location that is to be read from or stored into(D) contains a copy of the designated memory location specified by the MAR after a “read” or the new contents of the memory prior to a “write” |
Answer» | |
21. |
If the two matriceshave the same determinant, then the value of x is(A) 1/2(B) √2(C) ± 1/2(D) ± 1/√2 |
Answer» None | |
22. |
The device which is used to connect a peripheral to bus is known as(A) control register(B) interface(C) communication protocol(D) none of these |
Answer» | |
23. |
If a square matrix A satisfies AT = I, then the matrix, A is(A) Idempotent(B) Symmetric(C) Orthogonal(D) Hermitian |
Answer» None | |
24. |
Consider the graph shown in the figure below:Which of the following is a valid strong component?(A) a, c, d(B) a, b, d(C) b, c, d(D) a, b, c |
Answer» | |
25. |
The maximum number of edges in a n-node undirected graph without self loops is(A) n2(B) n * (n-1)/2(C) n – 1(D) (n + 1) * n/2 |
Answer» | |
26. |
The circuit shown in the following figure realizes the function(A) ( ( A + B )’ + C ) ( D’ E’ )(B) ( ( A + B)’ + C)(D E’ )(C) ( A + ( B + C )’) ( D’E )(D) (A + B + C’ )( D’ E’) |
Answer» None | |
27. |
The Boolean expression Y = (A + B’ + A’B)C’ is given by(A) AC’(B) BC’(C) C’(D) AB |
Answer» None | |
28. |
The minimum number of fields with each node of doubly linked list is(A) 1(B) 2(C) 3(D) 4 |
Answer» | |
29. |
Which of the following operations is performed more efficiently by doubly linked list than by linear linked list?(A) Deleting a node whose location is given(B) Searching an unsorted list for a given item(C) Inserting a node after the node with a given location(D) Traversing the list to process each node |
Answer» | |
30. |
The time required to search an element in a linked list of length n is(A) O (log n)(B) O (n)(C) O (1)(D) O(n2) |
Answer» | |
31. |
The TCP sliding window(A) can be used to control the flow of information(B) always occurs when the field value is 0(C) always occurs when the field value is 1(D) occurs horizontally |
Answer» | |
32. |
Fork is(A) the creation of a new job(B) the dispatching of a task(C) increasing the priority of a task(D) the creation of a new process |
Answer» | |
33. |
What is the name of the operating system that reads and reacts in terms of operating system?(A) Batch system(B) Quick response time(C) real time system(D) Time sharing system |
Answer» | |
34. |
A public key encryption system(A) allows anyone to decode the transmissions(B) allows only the correct sender to decode the data(C) allows only the correct receiver to decode the data(D) does not encode the data before transmitting it |
Answer» | |
35. |
Overlaying(A) requires use of a loader(B) allows larger programs, but requires more effort(C) is most used on large computers(D) is transparent to the user |
Answer» | |
36. |
In which of the following four necessary conditions for deadlock processes claim exclusive control of the resources they require?(A) no preemption(B) mutual exclusion(C) circular wait(D) hold and wait |
Answer» | |
37. |
A critical section is a program segment(A) which should run in a certain amount of time(B) which avoids deadlocks(C) where shared resources are accessed(D) which must be enclosed by a pair of semaphore operations P and V |
Answer» | |